城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2401:b00:6:210::80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 60779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2401:b00:6:210::80. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Feb 19 02:58:49 CST 2022
;; MSG SIZE rcvd: 47
'
0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1.2.0.6.0.0.0.0.0.b.0.1.0.4.2.ip6.arpa domain name pointer kpun.gov.my.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1.2.0.6.0.0.0.0.0.b.0.1.0.4.2.ip6.arpa name = kpun.gov.my.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 109.188.85.198 | attack | Automatic report - Port Scan Attack |
2019-10-05 15:30:05 |
| 103.78.9.44 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-10-05 15:17:45 |
| 156.216.27.32 | attackspambots | Honeypot attack, port: 23, PTR: host-156.216.32.27-static.tedata.net. |
2019-10-05 15:28:32 |
| 212.129.32.52 | attackspam | Automated report (2019-10-05T03:51:46+00:00). Faked user agent detected. |
2019-10-05 15:25:56 |
| 151.84.105.118 | attack | Oct 5 09:13:09 core sshd[20510]: Invalid user 12#45qwErtasDfgzxCvb from 151.84.105.118 port 39038 Oct 5 09:13:11 core sshd[20510]: Failed password for invalid user 12#45qwErtasDfgzxCvb from 151.84.105.118 port 39038 ssh2 ... |
2019-10-05 15:32:21 |
| 120.236.169.135 | attack | 2019-10-05T08:08:03.369269MailD postfix/smtpd[19301]: warning: unknown[120.236.169.135]: SASL LOGIN authentication failed: authentication failure 2019-10-05T08:08:05.476629MailD postfix/smtpd[19301]: warning: unknown[120.236.169.135]: SASL LOGIN authentication failed: authentication failure 2019-10-05T08:08:09.027662MailD postfix/smtpd[19301]: warning: unknown[120.236.169.135]: SASL LOGIN authentication failed: authentication failure |
2019-10-05 15:15:33 |
| 114.34.211.150 | attack | Honeypot attack, port: 23, PTR: 114-34-211-150.HINET-IP.hinet.net. |
2019-10-05 15:33:59 |
| 45.6.72.17 | attackbots | Oct 5 07:06:06 www5 sshd\[49111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17 user=root Oct 5 07:06:08 www5 sshd\[49111\]: Failed password for root from 45.6.72.17 port 38530 ssh2 Oct 5 07:10:38 www5 sshd\[49914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17 user=root ... |
2019-10-05 15:15:58 |
| 104.144.21.254 | attackspam | (From gretchen.nichols779@gmail.com) Hello, I'm quite certain you're aware that most successful businesses always have their website come up on the first page of Google search results since they're more relevant, popular, and more credible compared to the other companies found on page 2 or so on. Have you ever wondered how these websites dominated the first page? It's not at all difficult to achieve! We can put your site on the first page using search engine optimization. I ran a few tests on your website and found out that there are many keywords you can potentially rank for. These are crucial for you to be easily found while people searching on Google input words relevant to your products or services. To give you an idea of my work, I will send you case studies of websites I've worked with before and how they gained more profit after the optimization. I'll also give you a free consultation over the phone, and the information about your website can benefit you whether or not you choose to avail of m |
2019-10-05 15:35:47 |
| 14.63.194.162 | attackspambots | Oct 5 07:05:50 www5 sshd\[48954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.194.162 user=root Oct 5 07:05:52 www5 sshd\[48954\]: Failed password for root from 14.63.194.162 port 42040 ssh2 Oct 5 07:10:20 www5 sshd\[49737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.194.162 user=root ... |
2019-10-05 15:13:05 |
| 42.200.150.157 | attack | Unauthorised access (Oct 5) SRC=42.200.150.157 LEN=40 TTL=239 ID=60071 TCP DPT=445 WINDOW=1024 SYN |
2019-10-05 14:59:13 |
| 223.202.201.220 | attackbotsspam | $f2bV_matches |
2019-10-05 15:28:15 |
| 103.236.193.242 | attackbots | Honeypot attack, port: 23, PTR: 193.236.103-242.in-addr.arpa. |
2019-10-05 15:23:40 |
| 136.243.40.9 | attack | [portscan] Port scan |
2019-10-05 15:05:37 |
| 183.82.100.141 | attack | Oct 5 08:50:20 vpn01 sshd[13760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.100.141 Oct 5 08:50:23 vpn01 sshd[13760]: Failed password for invalid user Active123 from 183.82.100.141 port 36646 ssh2 ... |
2019-10-05 15:24:10 |